Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
Articles 1 - 3 of 3
Full-Text Articles in Social and Behavioral Sciences
Maturing International Cooperation To Address The Cyberspace Attack Attribution Problem, Jeff J. Mcneil
Maturing International Cooperation To Address The Cyberspace Attack Attribution Problem, Jeff J. Mcneil
Graduate Program in International Studies Theses & Dissertations
One of the most significant challenges to deterring attacks in cyberspace is the difficulty of identifying and attributing attacks to specific state or non-state actors. The lack of technical detection capability moves the problem into the legal realm; however, the lack of domestic and international cyberspace legislation makes the problem one of international cooperation. Past assessments have led to collective paralysis pending improved technical and legal advancements. This paper demonstrates, however, that any plausible path to meaningful defense in cyberspace must include a significant element of international cooperation and regime formation.
The analytical approach diverges from past utilitarian-based assessments to …
Telecommunications Technology And Sovereignty: Effects On States As Information Transfer Increased From The Speed Of Oxcart To The Speed Of Light, James H. Radford
Telecommunications Technology And Sovereignty: Effects On States As Information Transfer Increased From The Speed Of Oxcart To The Speed Of Light, James H. Radford
Graduate Program in International Studies Theses & Dissertations
Sovereignty---the absolute and unlimited power of the state---provides independence of action. Information about actions or intentions of competitors, enemies, or even friends, arriving after extended periods of time, resulted in responses to fait accompli. When information travels nearly instantaneously, states must consider potentially rapid international reactions before the fact. This suggests that since a state's freedom of action has been abridged, the nature of their sovereignty has altered.
This study pursues the research question: In what ways does telecommunications technology affect state sovereignty? The evolution of sovereignty is compared to development of telecommunications technology over four distinct eras, each …
Information Warfare: Technology And The Information Advantage, Daniel Matthew Parker
Information Warfare: Technology And The Information Advantage, Daniel Matthew Parker
Graduate Program in International Studies Theses & Dissertations
This thesis analyzes information warfare--that emerging form of warfare that attempts to destroy, degrade and exploit the information systems of another, while protecting one's own--in the context of the technology of warfare. Just as one might peel an onion, the analysis proceeds from a general analysis of technology in warfare to the more specific analysis of information warfare as it is currently defined. Information technology is an enabling factor in the emergence of information warfare as a new warfare area. Although it is revolutionizing the way warfare is conducted, the elements of information warfare have been practiced for thousands of …